PacktPublishing / Learning-Python-for-Forensics-Second-EditionLinks
Learning Python for Forensics, Second Edition, Published by Packt
☆47Updated 2 years ago
Alternatives and similar repositories for Learning-Python-for-Forensics-Second-Edition
Users that are interested in Learning-Python-for-Forensics-Second-Edition are comparing it to the libraries listed below
Sorting:
- Python Digital Forensics Cookbook, published by Packt☆103Updated 2 years ago
- Python Digital Forensics [video], published by Packt☆20Updated 2 years ago
- Learning Python for Forensics by Packt Publishing☆121Updated 2 years ago
- Code for the Python Digital Forensics Cookbook☆62Updated 7 years ago
- ☆89Updated this week
- Digital Forensics with Kali Linux, published by Packt☆93Updated 2 years ago
- Hands-On Penetration Testing with Python, published by Packt☆82Updated last year
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆120Updated 2 years ago
- Python Digital Forensics Cookbook by Packt☆17Updated 5 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year
- Python Penetration Testing for Developers, published by Packt☆40Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- ☆48Updated last week
- Malware Analysis Techniques, published by Packt☆73Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆65Updated 2 years ago
- Penetration Testing with Shellcode, published by Packt☆36Updated 2 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- ☆24Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 3 weeks ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Documentation for Zeek☆50Updated this week
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- ☆55Updated this week
- Tools for DFIR☆120Updated 7 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago